Serialization

This commit is contained in:
Noah L. Schrick 2022-02-27 19:58:10 -06:00
parent be25b6da85
commit c753fb7a99
15 changed files with 186 additions and 121 deletions

View File

@ -1,13 +1,13 @@
\relax \relax
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{23}{}\protected@file@percent }
\newlabel{App:A}{{A}{20}} \newlabel{App:A}{{A}{23}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{24}{}\protected@file@percent }
\newlabel{App:B}{{B}{21}} \newlabel{App:B}{{B}{24}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{24}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{24}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{24}{}\protected@file@percent }
\@setckpt{Appendices}{ \@setckpt{Appendices}{
\setcounter{page}{22} \setcounter{page}{25}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{4} \setcounter{enumi}{4}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,5 +1,6 @@
\TUchapter{RELATED WORKS} \TUchapter{RELATED WORKS}
Many authors and researchers have developed or extended attack graphs since their beginning
as attack trees. This Chapter reviews a few of their efforts as they relate to this work.
\TUsection{Introduction to Graph Generation} \TUsection{Introduction to Graph Generation}
\TUsection{Improvements to Attack Graph Generation} \label{sec:related_works} \TUsection{Improvements to Attack Graph Generation} \label{sec:related_works}

View File

@ -1,30 +1,36 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}\protected@file@percent } \citation{cook_rage_2018}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}\protected@file@percent } \citation{li_concurrency_2019}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task One}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Zero}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task One}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Two}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Three}{14}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{15}{}\protected@file@percent }
\newlabel{fig:RAGE_chart}{{5.1}{15}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{16}{}\protected@file@percent }
\newlabel{fig:tasks}{{5.2}{16}}
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{17}{}\protected@file@percent }
\@setckpt{Chapter5}{ \@setckpt{Chapter5}{
\setcounter{page}{15} \setcounter{page}{18}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{4} \setcounter{enumi}{4}
\setcounter{enumii}{0} \setcounter{enumii}{0}
@ -39,7 +45,7 @@
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{0} \setcounter{figure}{2}
\setcounter{table}{0} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}

View File

@ -1,13 +1,56 @@
\TUchapter{IMPLEMENTATION OF MESSAGE PASSING INTERFACE} \TUchapter{Utilization OF MESSAGE PASSING INTERFACE}
\TUsection{Introduction to MPI Utilization for Attack Graph Generation} \TUsection{Introduction to MPI Utilization for Attack Graph Generation}
\TUsection{Necessary Components} \TUsection{Necessary Components}
\TUsubsection{Serialization} \TUsubsection{Serialization}
In order to distribute workloads across nodes in a distributed system, various
types of data will need to be sent and received. Support and mechanisms vary based
on the MPI implementation, but most fundamental data types such as integers, doubles,
characters, and Booleans are incorporated into the MPI implementation. While this does
simplify some of the messages that need to be sent and received in the MPI approaches of
attack graph generation, it does not cover the vast majority of them.
RAGE implements many custom classes and structs that are used throughout the generation process.
Qualities, topologies, network states, and exploits are a few such examples. Rather than breaking
each of these down into fundamental types manually, serialization functions are leveraged to handle
most of this. RAGE already incorporates Boost graph libraries for auxiliary support, so this work
extended this further to utilize the serialization libraries also provided by Boost. These
libraries also include support for serializing all STL classes, and many of the RAGE
classes have members that make use of the STL classes. One additional advantage of the Boost
library approach is that many of the RAGE class members are nested. For example, the NetworkState
class has a member vector of Quality classes. When serializing the NetworkState class, boost will
recursively serialize all members, including the custom class members, assuming they also have
serialization functions.
When using the serialization libraries, this work opted to use the intrusive route, where the
class instances are altered directly. This was preferable to the non-intrusive approach, since
the class instances were able to be altered with relative ease, and many of the class instances
did not expose enough information for the non-intrusive approach to be viable.
\TUsubsection{Data Consistency} \TUsubsection{Data Consistency}
\TUsection{Tasking Approach} \TUsection{Tasking Approach}
\TUsubsection{Introduction to the Tasking Approach} \TUsubsection{Introduction to the Tasking Approach}
The high-level overview of the RAGE Data Flow Diagram was presented by the author of
\cite{cook_rage_2018}, and can be seen in Figure \ref{fig:RAGE_chart}. This diagram
includes an attack graph generation block that can be broken down into six main tasks.
These tasks are described in Figure \ref{fig:tasks}. Prior works such as that seen by the
authors of \cite{li_concurrency_2019} work to parallelize the attack graph generation using
OpenMP by dividing the frontier. This approach, however, utilizes Message Passing Interface (MPI)
to distribute the six tasks to examine the effect on speedup, efficiency, and scalability for
attack graph generation.
\begin{figure}[htp]
\includegraphics[width=\linewidth]{"./Chapter5_img/RAGE_Chart.png"}
\vspace{.2truein} \centerline{}
\caption{Generation Flowchart of RAGE}
\label{fig:RAGE_chart}
\end{figure}
\begin{figure}[htp]
\includegraphics[width=\linewidth]{"./Chapter5_img/horiz_task.drawio.png"}
\vspace{.2truein} \centerline{}
\caption{Task Overview of the Attack Graph Generation Process}
\label{fig:tasks}
\end{figure}
\TUsubsection{Algorithm Design} \TUsubsection{Algorithm Design}
\TUsubsubsection{Communication Structure} \TUsubsubsection{Communication Structure}

BIN
Chapter5_img/RAGE_Chart.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 51 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 142 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 61 KiB

View File

@ -1,23 +1,23 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{18}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{19}{}\protected@file@percent }
\@setckpt{Chapter6}{ \@setckpt{Chapter6}{
\setcounter{page}{17} \setcounter{page}{20}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{4} \setcounter{enumi}{4}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,8 +1,8 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{20}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{20}{}\protected@file@percent }
\@setckpt{Chapter7}{ \@setckpt{Chapter7}{
\setcounter{page}{18} \setcounter{page}{21}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{4} \setcounter{enumi}{4}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -31,12 +31,12 @@
\bibcite{phillips_graph-based_1998}{8} \bibcite{phillips_graph-based_1998}{8}
\bibcite{schneier_modeling_1999}{9} \bibcite{schneier_modeling_1999}{9}
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}} \@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\bibcite{sheyner_automated_2002}{10} \bibcite{sheyner_automated_2002}{10}
\bibcite{zhang_boosting_2017}{11} \bibcite{zhang_boosting_2017}{11}
\bibstyle{plain} \bibstyle{plain}
\@input{Appendices.aux} \@input{Appendices.aux}
\gdef \@abspage@last{31} \gdef \@abspage@last{34}

View File

@ -1,3 +1,5 @@
{\vspace {\baselineskip }} {\vspace {\baselineskip }}
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}% \contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}%
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}% \contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}%
\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{15}{}%
\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{16}{}%

View File

@ -1,8 +1,8 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 26 FEB 2022 17:08 This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 27 FEB 2022 19:57
entering extended mode entering extended mode
restricted \write18 enabled. restricted \write18 enabled.
%&-line parsing enabled. %&-line parsing enabled.
**Schrick-Noah_MS-Thesis.tex **Schrick-Noah_MS-Thesis
(./Schrick-Noah_MS-Thesis.tex (./Schrick-Noah_MS-Thesis.tex
LaTeX2e <2021-11-15> patch level 1 LaTeX2e <2021-11-15> patch level 1
L3 programming layer <2021-11-22> L3 programming layer <2021-11-22>
@ -254,39 +254,52 @@ CHAPTER 5.
]) [14] ]
<./Chapter5_img/RAGE_Chart.png, id=83, 495.8525pt x 557.08125pt>
File: ./Chapter5_img/RAGE_Chart.png Graphic file (type png)
<use ./Chapter5_img/RAGE_Chart.png>
Package pdftex.def Info: ./Chapter5_img/RAGE_Chart.png used on input line 43.
(pdftex.def) Requested size: 469.75499pt x 527.76213pt.
<./Chapter5_img/horiz_task.drawio.png, id=84, 1125.20375pt x 738.76pt>
File: ./Chapter5_img/horiz_task.drawio.png Graphic file (type png)
<use ./Chapter5_img/horiz_task.drawio.png>
Package pdftex.def Info: ./Chapter5_img/horiz_task.drawio.png used on input li
ne 49.
(pdftex.def) Requested size: 469.75499pt x 308.4171pt.
[14] [15 <./Chapter5_img/RAGE_Chart.png>] [16 <./Chapter5_img/horiz_task.drawi
o.png>]) [17]
\openout2 = `Chapter6.aux'. \openout2 = `Chapter6.aux'.
(./Chapter6.tex (./Chapter6.tex
CHAPTER 6. CHAPTER 6.
[15 [18
]) [16] ]) [19]
\openout2 = `Chapter7.aux'. \openout2 = `Chapter7.aux'.
(./Chapter7.tex (./Chapter7.tex
CHAPTER 7. CHAPTER 7.
) [17 ) [20
] (./Schrick-Noah_MS-Thesis.bbl [18 ] (./Schrick-Noah_MS-Thesis.bbl [21
]) ])
\c@appendixno=\count269 \c@appendixno=\count269
[19] [22]
\openout2 = `Appendices.aux'. \openout2 = `Appendices.aux'.
(./Appendices.tex [20 (./Appendices.tex [23
]) ])
[21] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) [24] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
(./Chapter7.aux) (./Appendices.aux)) ) (./Chapter7.aux) (./Appendices.aux)) )
(\end occurred inside a group at level 6) (\end occurred inside a group at level 6)
@ -299,23 +312,23 @@ CHAPTER 7.
### semi simple group (level 1) entered at line 52 (\begingroup) ### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level ### bottom level
Here is how much of TeX's memory you used: Here is how much of TeX's memory you used:
2129 strings out of 478353 2148 strings out of 478353
37349 string characters out of 5854635 37971 string characters out of 5854635
344903 words of memory out of 5000000 344925 words of memory out of 5000000
20202 multiletter control sequences out of 15000+600000 20218 multiletter control sequences out of 15000+600000
407157 words of font info for 39 fonts, out of 8000000 for 9000 407157 words of font info for 39 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191 1141 hyphenation exceptions out of 8191
55i,7n,62p,310b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s 55i,7n,62p,306b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/ c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c /amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb> mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (31 pages, 211425 bytes). Output written on Schrick-Noah_MS-Thesis.pdf (34 pages, 338284 bytes).
PDF statistics: PDF statistics:
137 PDF objects out of 1000 (max. 8388607) 150 PDF objects out of 1000 (max. 8388607)
89 compressed objects within 1 object stream 96 compressed objects within 1 object stream
0 named destinations out of 1000 (max. 500000) 0 named destinations out of 1000 (max. 500000)
11 words of extra memory for PDF output out of 10000 (max. 10000000) 21 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -35,56 +35,56 @@
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}% \contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}%
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}% \contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}%
\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}% \contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}%
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}% \contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{13}{}%
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}% \contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}%
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}% \contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}%
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}% \contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}%
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}% \contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{14}{}%
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}% \contentsline {section}{\numberline {5.3}\bf Tasking Approach}{14}{}%
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}% \contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{14}{}%
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}% \contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{14}{}%
\contentsline {subsubsection}{Communication Structure}{13}{}%
\contentsline {subsubsection}{Task Zero}{13}{}%
\contentsline {subsubsection}{Task One}{13}{}%
\contentsline {subsubsection}{Task Two}{13}{}%
\contentsline {subsubsection}{Task Three}{13}{}%
\contentsline {subsubsection}{Task Four}{13}{}%
\contentsline {subsubsection}{Task Five}{14}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}%
\contentsline {subsubsection}{Communication Structure}{14}{}% \contentsline {subsubsection}{Communication Structure}{14}{}%
\contentsline {subsubsection}{Worker Nodes}{14}{}% \contentsline {subsubsection}{Task Zero}{14}{}%
\contentsline {subsubsection}{Root Node}{14}{}% \contentsline {subsubsection}{Task One}{14}{}%
\contentsline {subsubsection}{Database Node}{14}{}% \contentsline {subsubsection}{Task Two}{14}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}% \contentsline {subsubsection}{Task Three}{14}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}% \contentsline {subsubsection}{Task Four}{17}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}% \contentsline {subsubsection}{Task Five}{17}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}% \contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{17}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}% \contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{17}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}% \contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{17}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}% \contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{17}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}% \contentsline {subsubsection}{Communication Structure}{17}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}% \contentsline {subsubsection}{Worker Nodes}{17}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}% \contentsline {subsubsection}{Root Node}{17}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}% \contentsline {subsubsection}{Database Node}{17}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}% \contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{17}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}% \contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{18}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}% \contentsline {section}{\numberline {6.1}\bf Small Networks}{18}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}% \contentsline {subsection}{\numberline {6.1.1}\it Test Information}{18}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}% \contentsline {subsection}{\numberline {6.1.2}\it Results}{18}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}% \contentsline {subsection}{\numberline {6.1.3}\it Analysis}{18}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}% \contentsline {section}{\numberline {6.2}\bf Large Networks}{18}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}% \contentsline {subsection}{\numberline {6.2.1}\it Test Information}{18}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}% \contentsline {subsection}{\numberline {6.2.2}\it Results}{18}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{18}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{18}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{18}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{18}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{18}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{18}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{19}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{19}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{19}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{20}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{20}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}% \contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}%
\addvspace {10pt} \addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}% \contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{23}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{24}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}% \contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{24}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}% \contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{24}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}% \contentsline {subsubsection}{A Sub-subsection in an Appendix}{24}{}%